Cybersecurity and digital forensics professional
Barcelona L'Hospitalet de Llob, ES, 08908
KPMG España
Servicios de auditoría, fiscales y de asesoramiento legal, financiero y de negocio.What would make you a great fit?
- Master or university degree in Information Technology or Computer Science with a focus on Cybersecurity and Forensics.
- Experienced (2 years and more) in Cybersecurity and Forensics (digital investigations on computers).
- Willingness to integrate large scale company and international environment.
- Work autonomy, growth mindset, learning agility and team player.
- Business acumen, strong communication skills and ability to present to different levels of stakeholders in a timely manner.
- Fluent Business English.
- Have previous experience working in Microsoft environment, Microsoft Purview and Microsoft Insider Risk Management.
- Have AZ900 and/or SC900 Certifications.
- Have previous experience working with the following solutions: Magnet Forensic Axiom, Exterro Forensic Toolkit (FTK) or OpenText EnCase Forensic.
- Have followed AXIOM AX200 training.
- Are a certified MCFE (Magnet Certified Forensics Examiner) professional.
- Have followed SANS FOR498 and/or FOR500 trainings.
- Are a certified GBFA (GIAC Battlefield Forensics and Acquisition) professional.
- Have previous experience working in international setting.
What will you do?
- Log Analysis: Review system, network, and application logs for unusual activities that could indicate insider threats, such as unauthorized data access, unusual login patterns, or file manipulation.
- Evidence collection: collect digital artifacts, such as emails, chat logs, and file access logs, while following strict evidence-handling procedures to ensure admissibility in potential legal proceedings artifacts.
- Disk and Memory Imaging: Create disk images of suspect systems and memory dumps to preserve the state of a system at a specific time. This preserves evidence and provides a baseline for further analysis.
- Metadata Preservation: Extract metadata from files, emails, and communications to understand how, when, and where data was accessed or modified.
- Behavioral Analysis: Use behavioral analytics tools to identify deviations in user behavior, such as downloading large amounts of sensitive data, accessing restricted areas, or frequently changing device locations.
- User Behavior Analysis: Examine logs and other data to understand the suspect's activity patterns and determine whether actions were intentional or accidental.
- Forensic Tool Utilization: Use specialized tools like Axiom, EnCase, FTK, and other forensic suites to investigate digital evidence, reconstruct actions, and identify patterns that may indicate a risk.
- Stay Updated on Threat Intelligence: Keep up to date with the latest insider threat tactics, techniques, and procedures (TTPs) and adjust detection and prevention strategies accordingly.
- Training and Awareness: Develop and deliver training sessions for employees and managers on recognizing and reporting insider threats, and best practices for data protection.
- Maintain Chain-of-Custody Logs: Ensure all evidence handling follows documented protocols to maintain a clear chain of custody.
- Compliance Checks: Ensure investigations are aligned with regulatory and legal requirements like GDPR, HIPAA, or SOC 2, depending on the organization’s industry.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
1
0
0
Category:
Forensics Jobs
Tags: Analytics Compliance Computer Science EnCase Forensics GDPR GIAC HIPAA Log analysis Risk management SANS SOC SOC 2 Threat intelligence TTPs
Perks/benefits: Career development
Region:
Europe
Country:
Spain
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Senior Security Analyst jobsInformation System Security Officer jobsSenior Cloud Security Engineer jobsInformation Security Manager jobsInformation Security Specialist jobsSenior Cybersecurity Engineer jobsSenior Network Security Engineer jobsSecurity Consultant jobsIT Security Engineer jobsCyber Security Specialist jobsSenior Penetration Tester jobsSecurity Specialist jobsSenior Information Security Analyst jobsSenior Cyber Security Engineer jobsChief Information Security Officer jobsSystems Engineer jobsSystems Administrator jobsInformation System Security Officer (ISSO) jobsSenior Product Security Engineer jobsCloud Security Architect jobsIT Security Analyst jobsPrincipal Security Engineer jobsStaff Security Engineer jobsSecurity Operations Analyst jobsCybersecurity Specialist jobs
DevSecOps jobsKubernetes jobsEncryption jobsPowerShell jobsIDS jobsSplunk jobsSaaS jobsEDR jobsSDLC jobsIPS jobsRMF jobsSQL jobsTop Secret jobsIntrusion detection jobsBash jobsCompTIA jobsThreat detection jobsITIL jobsFinance jobsOWASP jobsDoDD 8570 jobsCRISC jobsDocker jobsActive Directory jobsBanking jobs
UNIX jobsTCP/IP jobsVPN jobsGIAC jobsTerraform jobsSANS jobsClearance Required jobsIT infrastructure jobsHIPAA jobsSOX jobsSOC 2 jobsOSCP jobsCISO jobsIndustrial jobsJavaScript jobsCCSP jobsData Analytics jobsDNS jobsSOAR jobsPolygraph jobsJira jobsAnsible jobsMITRE ATT&CK jobsCyber defense jobsGCIH jobs